?Speaker identification refers to the process of recognizing human voice using artificial intelligence techniques. ?The proposed model will automate the entire process by recognizing the suspicious speaker and dig out all the audio conversations of target. ?To address problem, AI based
An Automated calls retreival system
•Speaker identification refers to the process of recognizing human voice using artificial intelligence techniques.
•The proposed model will automate the entire process by recognizing the suspicious speaker and dig out all the audio conversations of target.
•To address problem, AI based solution is recommended .
•From literature review it has been known that high recognition rate is achieved when MFCC is used as features.
•Speaker identification refers to the process of recognizing human voice using artificial intelligence techniques.
•The proposed model will automate the entire process by recognizing the suspicious speaker and dig out all the audio conversations of target.
•To address problem, AI based solution is recommended .
•From literature review it has been known that high recognition rate is achieved when MFCC is used as features.
The proposed model will work in two main phases:
The aim of this project is to identify the calls of known speaker(s) from the large database.
This will help the law enforcement agencies (LEAs) to dig out the calls of suspicious speakers.
Speaker identification refers to the process of recognizing human voice using artificial intelligence techniques.
The proposed model will automate the entire process by recognizing the suspicious speaker and dig out all the audio conversations of target.
To address problem, AI based solution is recommended .
From literature review it has been known that high recognition rate is achieved when MFCC is used as features.
This project will mainly benefit the Military or LEAs for security purposes. Moreover, this will not only assist the LEAs in their operation by retrieving the suspicious speakers calls from big database but also can be used in different commercial applications such as cellular operators etc.
The device will not only help our community in security but will produce some good research work in the form of publishable research articles.
The proposed model can easily be implemented in any international or national military organization or for commercial purposes, which will help in assisting international collaborations.
Dataset Collection
Feature Extraction
Model Training
Hardware Implementation Raspberry pie
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Raspberry pie | Equipment | 1 | 10000 | 10000 |
| power source | Equipment | 1 | 1000 | 1000 |
| Black box cover | Equipment | 1 | 1000 | 1000 |
| microphone | Equipment | 1 | 5000 | 5000 |
| Touch screen | Equipment | 1 | 5000 | 5000 |
| Misc. | Miscellaneous | 1 | 3000 | 3000 |
| Total in (Rs) | 25000 |
The electrical power systems are highly non-linear, extremely huge and complex networks....
Swarm Intelligence is a discipline of artificial intelligence that deals with solving comb...
The proposed project is specifically for people suffering from color blindness. Color blin...
The human body is a remarkable piece of biological machinery, and our limbs are no excepti...
Energy is the vital factor for the development of every country and its demand for power g...